PREVENTION OF FAKE NEWS PROPAGATION USING BLOCK CHAIN TECHNOLOGY

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 08 Issue: 11 | Nov 2021

www.irjet.net

e-ISSN: 2395-0056 p-ISSN: 2395-0072

PREVENTION OF FAKE NEWS PROPAGATION USING BLOCK CHAIN TECHNOLOGY 1R.Rohini 2Dr.

M. Manimekalai., Msc., pgdca., Msc(IT)., M.phil., Ph.D.,Research Head, Shrimathi Indira Gandhi College, TRICHY-620002 ----------------------------------------------------------------------***---------------------------------------------------------------------

Abstract: Social media has given everybody to specific sees and communicate to masses but it also becomes a place for hateful behavior, abusive language, cyberbullying and personal attacks. In any case, deciding comment or a post is damaging or not is still troublesome and time expending most of the social media platforms still searching for more efficient ways for efficient moderate solution. Mechanizing this will offer assistance in distinguishing injurious comments, and spare the websites and increment client security and move forward discourses online. Hence, it is not feasible for a human moderator to check each comment one by one and flag them as abusive or not abusive. For this reason, an computerized classifier which is speedy and productive is essential to distinguish such sort of comments. To full fill over reason, in this model a KMeans classifier is designed to detect abusive comments expressed in media. Using the data feed from user’s posts, the Naïve Bays classifier is employed to categorize comments as abusive or not abusive. In this system, fake news also prevented using block chain technology. Fake news are prevented using user based spam report and content based spam report.

but a few frameworks require the utilize of a fat client. This framework is utilized to control a energetic collection of Web fabric, counting HTML reports, pictures, and other shapes of media. This venture encourages record control, examining, altering, and timeline management. Thus this Web application improves to secure the confined words that are post in social organizing by giving a caution to the client whereas submitting their posts within the social organizing. CHAPTER-2 PROBLEMDEFINTION Nowadays most of the people communicate through social networking all over the world. People criticize and comments about every concepts, news, events, etc.., But frequently users use the restricted comments, words etc.., in public that will tends to a major problem in our society or a personal one. Consequently this Web application upgrades to secure the confined words that are post in social organizing by giving a caution to the client whereas submitting their posts within the social organizing.

CHAPTER -1 INTRODUCTION

EXISTING SYSTEM

Social Networking is a huge medium of communication. Millions of people sharing their comments about every concept and issues arising all over the world . Censure information was approached in all social medium such as television, cinema, newspapers, magazines, radio broadcast, etc. This will show disapproval to restricted data that was used by the people in the network. But in social networking users easily update the restricted data without any censure. Hence censure data in social networking is highly recommended for the communication world nowadays. Implementation of censure data in social networking will surely reduce the growth of communication.

The issue is that part of time expended to the individuals for checking the message submitted in the social networking and file a case in cyber crime. After confirmation cyber wrongdoing defense commission will evacuate the post agreeing to the cyber wrongdoing rules in a span of time. This will not solve the problem only to remove the things after the issue arises. Disadvantages: Due to obliviousness and need of understanding of Social Media security highlight, individuals make numerous botches.

Most frameworks utilize a Substance Store or a database to store page substance, metadata, and other data resources that may be required by the framework. A webpage shows the substance to site guests based on a set of formats. Most frameworks utilize server side caching to make strides execution. Organization is ordinarily done through browser-based interfacing,

© 2021, IRJET

|

Impact Factor value: 7.529

Another circumstance to consider should do with the accessibility of data as well individual, whether in pictures or content. You cannot donate out as well much individual data. As all through the Web, The Client can send their post with a few unlawful words and letters.

|

ISO 9001:2008 Certified Journal

|

Page 1445


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.